OpenSuse LEAP 15 Common Problems and Their Solutions
OpenSuse LEAP 15 Common Problems and Their Solutions
/var/log/apparmor/
Log files from AppArmor, see Book “Security Guide” for
detailed information.
Log file from Audit to track any access to files, directories,
/var/log/audit/audit.log or resources of your system, and trace system calls.
See Book “Security Guide” for detailed information.
/var/log/mail.* Messages from the mail system.
/var/log/NetworkManager
Log file from NetworkManager to collect problems with
network connectivity
/var/log/samba/ Directory containing Samba server and client log messages.
/var/log/warn
All messages from the kernel and system log daemon with
the “warning” level or higher.
/var/log/wtmp
Binary file containing user login records for the current
machine session. View it with last.
/var/log/Xorg.*.log
Various start-up and runtime log files from the X Window
System. It is useful for debugging failed X start-ups.
/var/log/YaST2/ Directory containing YaST's actions and their results.
/var/log/zypper.log Log file of Zypper.
Apart from log files, your machine also supplies you with information about the
running system. See Table 16.2: System Information With the /proc File System
TABLE 16.2: SYSTEM INFORMATION WITH THE /PROC FILE SYSTEM REPORT BUG#
File Description
/proc/cpuinfo Contains processor information, including its type, make, model, and
File Description
performance.
/proc/dma Shows which DMA channels are currently being used.
/proc/interrupts
Shows which interrupts are in use, and how many of each have been
in use.
/proc/iomem Displays the status of I/O (input/output) memory.
/proc/ioports Shows which I/O ports are in use at the moment.
/proc/meminfo Displays memory status.
/proc/modules Displays the individual modules.
/proc/mounts Displays devices currently mounted.
/proc/partitions Shows the partitioning of all hard disks.
/proc/version Displays the current version of Linux.
Apart from the /proc file system, the Linux kernel exports information with
the sysfs module, an in-memory file system. This module represents kernel
objects, their attributes and relationships. For more information about sysfs, see
the context of udev in Book “Reference”, Chapter 16 “Dynamic Kernel Device Management
with udev”. Table 16.3 contains an overview of the most common directories
under /sys.
TABLE 16.3: SYSTEM INFORMATION WITH THE /SYS FILE SYSTEM REPORT BUG#
File Description
/sys/block
Contains subdirectories for each block device discovered in the system.
Generally, these are mostly disk type devices.
/sys/bus Contains subdirectories for each physical bus type.
/sys/class
Contains subdirectories grouped together as a functional types of devices
(like graphics, net, printer, etc.)
/sys/device Contains the global device hierarchy.
Linux comes with several tools for system analysis and monitoring. See Book
“System Analysis and Tuning Guide”, Chapter 2 “System Monitoring Utilities” for a selection of
the most important ones used in system diagnostics.
Each of the following scenarios begins with a header describing the problem
followed by a paragraph or two offering suggested solutions, available references
for more detailed solutions, and cross-references to other scenarios that are
related.
16.2 Installation Problems REPORT BUG #
Installation problems are situations when a machine fails to install. It may fail
entirely or it may not be able to start the graphical installer. This section
highlights some typical problems you may run into, and offers possible solutions
or workarounds for these kinds of situations.
16.2.1 Checking Media REPORT BUG#
If you encounter any problems using the openSUSE Leap installation media,
check the integrity of your installation media. Boot from the media and
choose Check Installation Media from the boot menu. In a running system, start YaST
and choose Software › Media Check. To check the openSUSE Leap medium, insert it
into the drive and click Start Check in the Media Check screen of YaST. This may take
several minutes. If errors are detected, do not use this medium for installation.
Media problems may occur when having burned the medium yourself. Burning the
media at a low speed (4x) helps to avoid problems.
Installation via VNC works with any browser under any operating system, provided Java support is
enabled.
Provide the IP address and password to your VNC viewer when prompted. A window opens,
displaying the installation dialogs. Proceed with the installation as usual.
16.2.6 Only Minimalistic Boot Screen Started REPORT BUG#
You inserted the medium into the drive, the BIOS routines are finished, but the
system does not start with the graphical boot screen. Instead it launches a very
minimalistic text-based interface. This may happen on any machine not providing
sufficient graphics memory for rendering a graphical boot screen.
Although the text boot screen looks minimalistic, it provides nearly the same
functionality as the graphical one:
Boot Options
Unlike the graphical interface, the different boot options cannot be
selected using the cursor keys of your keyboard. The boot menu of the
text mode boot screen offers some keywords to enter at the boot prompt.
These keywords map to the options offered in the graphical version. Enter
your choice and press Enter to launch the boot process.
Custom Boot Options
After selecting a boot option, enter the appropriate keyword at the boot
prompt or enter some custom boot options as described in Section 16.2.4,
“Fails to Boot”. To launch the installation process, press Enter .
Screen Resolutions
Use the F keys to determine the screen resolution for installation. If you
need to boot in text mode, choose F3 .
Log out.
Log in again, but do not run any applications.
Recover your individual application configuration data (including the Evolution e-mail client
data) by copying the ~/.gconf-ORIG-RECOVER/apps/ directory back into the
new ~/.gconf directory as follows:
cp -a .gconf-ORIG-RECOVER/apps .gconf/
If this causes the login problems, attempt to recover only the critical application data and
reconfigure the remainder of the applications.
16.5 Network Problems REPORT BUG #
Many problems of your system may be network-related, even though they do not
seem to be at first. For example, the reason for a system not allowing users to
log in may be a network problem of some kind. This section introduces a simple
checklist you can apply to identify the cause of any network problem
encountered.
PROCEDURE 16.6: HOW TO IDENTIFY NETWORK PROBLEMS REPORT BUG#
When checking the network connection of your machine, proceed as follows:
If you use an Ethernet connection, check the hardware first. Make sure that your network
cable is properly plugged into your computer and router (or hub, etc.). The control lights next to
your Ethernet connector are normally both be active.
If the connection fails, check whether your network cable works with another machine. If it does,
your network card causes the failure. If hubs or switches are included in your network setup, they
may be faulty, as well.
If using a wireless connection, check whether the wireless link can be established by other
machines. If not, contact the wireless network's administrator.
Once you have checked your basic network connectivity, try to find out which service is not
responding. Gather the address information of all network servers needed in your setup. Either look
them up in the appropriate YaST module or ask your system administrator. The following list gives
some typical network servers involved in a setup together with the symptoms of an outage.
DNS (Name Service)
A broken or malfunctioning name service affects the network's functionality in many ways.
If the local machine relies on any network servers for authentication and these servers cannot
be found because of name resolution issues, users would not even be able to log in.
Machines in the network managed by a broken name server would not be able to “see” each
other and communicate.
NTP (Time Service)
A malfunctioning or completely broken NTP service could affect Kerberos authentication
and X server functionality.
NFS (File Service)
If any application needs data stored in an NFS mounted directory, it cannot start or function
properly if this service was down or misconfigured. In the worst case scenario, a user's
personal desktop configuration would not come up if their home directory containing
the .gconf subdirectory could not be found because of a faulty NFS server.
Samba (File Service)
If any application needs data stored in a directory on a faulty Samba server, it cannot start or
function properly.
NIS (User Management)
If your openSUSE Leap system relies on a faulty NIS server to provide the user data, users
cannot log in to this machine.
LDAP (User Management)
If your openSUSE Leap system relies on a faulty LDAP server to provide the user data,
users cannot log in to this machine.
Kerberos (Authentication)
Authentication will not work and login to any machine fails.
CUPS (Network Printing)
Users cannot print.
Check whether the network servers are running and whether your network setup allows you
to establish a connection:
Important: Limitations
The debugging procedure described below only applies to a simple network server/client setup that
does not involve any internal routing. It assumes both server and client are members of the same
subnet without the need for additional routing.
o Use ping IP address or host name (replace host name with the host
name of the server) to check whether each one of them is up and responding to the network. If this
command is successful, it tells you that the host you were looking for is up and running and that
the name service for your network is configured correctly.
If ping fails with destination host unreachable, either your system or the desired server is not
properly configured or down. Check whether your system is reachable by running ping IP
address or your_host_name from another machine. If you can reach your machine from
another machine, it is the server that is not running or not configured correctly.
If ping fails with unknown host, the name service is not configured correctly or the host name
used was incorrect. For further checks on this matter, refer to Step 4.b. If ping still fails, either
your network card is not configured correctly or your network hardware is faulty.
o Use host host name to check whether the host name of the server you are trying
to connect to is properly translated into an IP address and vice versa. If this command returns the
IP address of this host, the name service is up and running. If the host command fails, check all
network configuration files relating to name and address resolution on your host:
/etc/resolv.conf
This file is used to keep track of the name server and domain you are currently using. It can
be modified manually or automatically adjusted by YaST or DHCP. Automatic adjustment is
preferable. However, make sure that this file has the following structure and all network
addresses and domain names are correct:
search fully_qualified_domain_name
nameserver ipaddress_of_nameserver
This file can contain more than one name server address, but at least one of them must be
correct to provide name resolution to your host. If needed, adjust this file using the YaST
Network Setting module (Hostname/DNS tab).
If your network connection is handled via DHCP, enable DHCP to change host name and
name service information by selecting Change Hostname via DHCP and Update Name
Servers and Search List via DHCP in the YaST DNS and Hostname module.
/etc/nsswitch.conf
This file tells Linux where to look for name service information. It should look like this:
...
hosts: files dns
networks: files dns
...
The dns entry is vital. It tells Linux to use an external name server. Normally, these entries
are automatically managed by YaST, but it would be prudent to check.
If all the relevant entries on the host are correct, let your system administrator check the
DNS server configuration for the correct zone information. For detailed information about
DNS, refer to Book “Reference”, Chapter 19 “The Domain Name System”. If you have
made sure that the DNS configuration of your host and the DNS server are correct, proceed
with checking the configuration of your network and network device.
o If your system cannot establish a connection to a network server and you have
excluded name service problems from the list of possible culprits, check the configuration of your
network card.
Use the command ip addr show network_device to check whether this device was
properly configured. Make sure that the inet address with the netmask (/mask) is configured
correctly. An error in the IP address or a missing bit in your network mask would render your
network configuration unusable. If necessary, perform this check on the server as well.
o If the name service and network hardware are properly configured and running, but
some external network connections still get long time-outs or fail entirely,
use traceroute fully_qualified_domain_name (executed as root) to track the network
route these requests are taking. This command lists any gateway (hop) that a request from your
machine passes on its way to its destination. It lists the response time of each hop and whether this
hop is reachable. Use a combination of traceroute and ping to track down the culprit and let the
administrators know.
Once you have identified the cause of your network trouble, you can resolve it
yourself (if the problem is located on your machine) or let the system
administrators of your network know about your findings so they can reconfigure
the services or repair the necessary systems.
16.5.1 NetworkManager Problems REPORT BUG#
If you have a problem with network connectivity, narrow it down as described
in Procedure 16.6, “How to Identify Network Problems”. If NetworkManager
seems to be the culprit, proceed as follows to get logs providing hints on why
NetworkManager fails:
Open a shell and log in as root.
Restart the NetworkManager:
systemctl restart Network.Manager
Open a Web page, for example, http://www.opensuse.org as normal user to see, if you can connect.
Collect any information about the state of NetworkManager
in /var/log/NetworkManager.
For more information about NetworkManager, refer to Book “Reference”, Chapter 28
“Using NetworkManager”.
16.6 Data Problems REPORT BUG #
Data problems are when the machine may or may not boot properly but, in either
case, it is clear that there is data corruption on the system and that the system
needs to be recovered. These situations call for a backup of your critical data,
enabling you to recover the system state from before your system
failed. openSUSE Leap offers dedicated YaST modules for system backup and
restoration and a rescue system that can be used to recover a corrupted system
from the outside.
16.6.1 Managing Partition Images REPORT BUG#
Sometimes you need to perform a backup from an entire partition or even hard
disk. Linux comes with the dd tool which can create an exact copy of your disk.
Combined with gzip you save some space.
PROCEDURE 16.7: BACKING UP AND RESTORING HARD DISKS REPORT BUG#
Start a Shell as user root.
Select your source device. Typically this is something like /dev/sda (labeled as SOURCE).
Decide where you want to store your image (labeled as BACKUP_PATH). It must be
different from your source device. In other words: if you make a backup from /dev/sda, your
image file must not to be stored under /dev/sda.
Run the commands to create a compressed image file:
dd if=/dev/SOURCE | gzip > /BACKUP_PATH/image.gz
11. Open the problematic configuration file in the vi editor. Adjust and save the configuration.
12. Unmount the root file system from the rescue system:
umount /mnt
16. Finally, mount the remaining partitions from the installed system:
mount -a
17. Now you have access to the installed system. Before rebooting the system, unmount the
partitions with umount -a and leave the “change root” environment with exit.
Warning: Limitations
Although you have full access to the files and applications of the installed system,
there are some limitations. The kernel that is running is the one that was booted
with the rescue system, not with the change root environment. It only supports
essential hardware and it is not possible to add kernel modules from the installed
system unless the kernel versions are identical. Always check the version of the
currently running (rescue) kernel with uname -r and then find out if a matching
subdirectory exists in the /lib/modules directory in the change root environment.
If yes, you can use the installed modules, otherwise you need to supply their
correct versions on other media, such as a flash disk. Most often the rescue
kernel version differs from the installed one — then you cannot simply access a
sound card, for example. It is also not possible to start a graphical user interface.
Also note that you leave the “change root” environment when you switch the
console with Alt – F1 to Alt – F6 .
16.6.2.4 Modifying and Re-installing the Boot Loader REPORT BUG#
Sometimes a system cannot boot because the boot loader configuration is
corrupted. The start-up routines cannot, for example, translate physical drives to
the actual locations in the Linux file system without a working boot loader.
To check the boot loader configuration and re-install the boot loader, proceed as
follows:
Perform the necessary steps to access the installed system as described in Section 16.6.2.3, “Accessing
the Installed System”.
Check that the GRUB 2 boot loader is installed on the system. If not, install the
package grub2 and run
grub2-install /dev/sda
Check whether the following files are correctly configured according to the GRUB 2
configuration principles outlined in Book “Reference”, Chapter 12 “The Boot Loader
GRUB 2” and apply fixes if necessary.
/etc/default/grub
/boot/grub2/device.map (optional file, only present if created manually)
/boot/grub2/grub.cfg (this file is generated, do not edit)
/etc/sysconfig/bootloader
Re-install the boot loader using the following command sequence:
grub2-mkconfig -o /boot/grub2/grub.cfg
Unmount the partitions, log out from the “change root” environment, and reboot the system:
umount -a
exit
reboot
16.6.2.5 Fixing Kernel Installation REPORT BUG#
A kernel update may introduce a new bug which can impact the operation of your
system. For example a driver for a piece of hardware in your system may be
faulty, which prevents you from accessing and using it. In this case, revert to the
last working kernel (if available on the system) or install the original kernel from
the installation media.